"value":"To be exposed to this vulnerability the device needs to have TCP-AO configured for at least one of BGP or LDP:\n\n [protocols bgp group <group-name> neighbor <neighbor-IP> authentication-algorithm ao]\n\n [protocols ldp session <peer-IP> authentication-algorithm ao]"
"value":"An Improper Authentication vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause an impact on confidentiality or integrity.\n\nA vulnerability in the processing of TCP-AO will allow a BGP or LDP peer not configured with authentication to establish a session even if the peer is locally configured to use authentication. This could lead to untrusted or unauthorized sessions being established.\nThis issue affects Juniper Networks Junos OS:\n21.2 versions prior to 21.2R3-S1;\n21.3 versions prior to 21.3R2-S2, 21.3R3;\n21.4 versions prior to 21.4R2-S1, 21.4R3;\n22.1 versions prior to 22.1R1-S1, 22.1R2.\n\nThis issue does not affect Juniper Networks Junos OS Evolved."
"value":"The following software releases have been updated to resolve this specific issue: 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, and all subsequent releases."
}
],
"source":{
"advisory":"JSA69893",
"defect":[
"1637928"
],
"discovery":"INTERNAL"
},
"work_around":[
{
"lang":"eng",
"value":"There are no viable workarounds for this issue."